Internet Safety Plan for Your Family

Size: px
Start display at page:

Download "Internet Safety Plan for Your Family"

Transcription

1 The Mcafee 10-Step Internet Safety Plan for Your Family How to talk to kids, tweens, teens, and novices of any age about online security 10

2 Table of Contents 3 Introduction 4 5 Today s Internet: Proceed with Caution A 10-Step Safety Plan to Help Protect Everyone in Your Family The ABCs of Online Security: 17 For Kids (3 to 7 years old) 21 For Tweens (8 to 12 years old) 26 For Teens (13 to 19 years old) 30 For Novices of Any Age 33 About McAfee

3 Introduction Millions of families worldwide use the Internet every day to learn, research, shop, buy, bank, invest, share photos, play games, download movies and music, connect with friends, meet new people, and engage in a host of other activities. Though cyberspace offers numerous benefits, opportunities, and conveniences, it is also increasingly risky, with many new threats emerging daily. It is no surprise that cybercriminals are taking advantage of the Internet and the people who use it. You and your family members need to be on guard whenever you go online. In addition to installing robust security software from a trusted company to defend your family against hackers, identity thieves, con artists, and predators, you need to follow some basic Internet safety rules and use good old-fashioned, real-world common sense. You need an Internet safety plan for your family. As soon as family members become active online and no matter what their age it s time to educate them about cyber safety. You should be aware that even if you do not have a computer at home, PCs are available almost everywhere at schools, libraries, friends homes, and even in church basements. It s important for everyone to know the basics about protecting themselves in cyberspace. 3

4 Today s Internet: Proceed With Caution 50% of online teens have given out personal information 1 Hackers are attacking PCs with Internet access every 39 seconds 2 According to McAfee Avert Labs, there are 222,000 known computer viruses out there now, and the number of threats is growing daily 30% of teens experienced cyberbullying one or more times during the school term 3 Internet crime is up 33% in 2008 from % of children have been exposed to harmful content million people worldwide are defrauded by mass marketing scams annually 5 1 EU Kids Online, Comparing children s online opportunities and risks across Europe ( ) 2 Hackers Attack Every 39 Seconds James Clark School of Engineering at the University of Maryland 3 theage.com.au Internet Crime Report, IC3 5 National Fraud Strategic Authority 4

5 A 10-Step Safety Plan to Help Protect Everyone in Your Family

6 Step 1 Consider Where You Place the Computer In a home with children, where you place the family computer is one of the most important decisions you can make. We recommend that you set up the computer in a high-traffic family area and limit the number of hours your children spend on it. Be sure you have computer security software with parental controls like those found in McAfee products or use specific software designed to protect children online, like McAfee Family Protection. Step 1 6

7 Step 2 Work As a Team to Set Boundaries Decide exactly what is okay and what is not okay with regard to: The kinds of websites that are appropriate to visit The chat rooms and forums that are appropriate to participate in: Use only monitored chat rooms Step 2 Make sure your children avoid.alt chat rooms, which focus on alternative topics that may be inappropriate for young people The kinds of things your children can discuss online and language that is considered inappropriate 7

8 Step 3 Together, Agree Upon Family PC Rules We recommend the following: Never log in with user names that reveal true identity or that are provocative Never reveal your passwords Never reveal phone numbers or addresses Never post information that reveals your identity Never post inappropriate photos or ones that may reveal your identity (for example: city or school names on shirts) Never share any information with strangers met online Never meet face-to-face with strangers met online Step 3 Never open attachments from strangers Once you have established the rules, post them next to the computer. 8

9 Step 4 Sign an Agreement for Appropriate Online Behaviour Write up an agreement or use the one on the following page, so that there is a clear understanding among all family members on appropriate computer use and online behaviour. Step 4 9

10 Online Safety Pledge Because using the computer and the Internet is a privilege I do not want to lose, I will surf, search, work, play, and chat safely whenever I go online I will follow all of the rules that we have agreed on I will not reveal my real name, my phone number, my address, or my passwords with online friends I will never meet in person with people I met online If I find myself in an online situation where I am unsafe or uncomfortable, I promise to let you (my parent/guardian/ teacher) know so that you can assist me I commit to this pledge and recognise that there are consequences to every decision I make Child s Signature As your parent/guardian/teacher, I promise to make myself available to you when you ask for assistance and will help you resolve any problems that may arise in any way that I can. Parent/Guardian/Teacher Signature 10

11 Step 5 Install Security Software Make sure you have robust security software that protects your computer against viruses, hackers, and spyware. It should also filter offensive content, pictures, and websites. This software should be updated frequently, as new threats are emerging daily. Ideally, security that updates automatically like McAfee set-it-and-forget-it software is the best choice. Step 5 11

12 Step 6 Use Parental Controls All the major security software providers offer parental controls. Be sure to enable them. If you are using freeware or software that doesn t have parental controls, consider purchasing software that does. Take time to learn how these controls work, and use options that filter and block inappropriate material. To completely protect your children online, use McAfee Family Protection software in addition to the parental controls in your security software. McAfee Family Protection software keeps children of all ages safe from exposure to inappropriate content, social networking risks, strangers, and other online threats. Step 6 Of course, these tools have their limitations. Nothing can take the place of attentive and responsive parents who monitor their children when they are online. 12

13 Step 7 Remind Family Members That People Met Online Are Strangers Everyone who goes online must understand this: No matter how often you chat with online friends, no matter how long you ve been chatting, and no matter how well you think you know them, people you meet online are strangers. It is easy to lie and pretend you are someone else when you are online. Kids especially need to know that a new friend may really be a 40-year-old man rather than someone their own age. Step 7 Social networking websites like Bebo, Orkut and Facebook are an ideal way to meet new people online. Therefore, you must visit these sites and check out your children s profile to ensure that inappropriate conversations are not taking place and that unacceptable photos are not being posted. You should also monitor your children s instant messaging conversations to make sure they aren t being pursued by an online predator. 13

14 Step 8 Create Strong Passwords To create passwords that are difficult to crack, start by using at least 8 characters and then use a combination of letters, numbers, and symbols. Passwords should be changed periodically to reduce the likelihood of a particular password being compromised over time. Techniques for strong passwords: Use a vanity licence plate: GR8way2B Use several small words with punctuation marks: Bindi#the^jungle@girl Put punctuation in the middle of a word: Beck%ham Use an unusual way of contracting a word: ftbllplyr Step 8 Use the first letter of each word in a phrase, with a random number: hard to crack this password = htc5tp Don t share your passwords! 14

15 Step 9 Check Your Computer s Security Software Open whatever security software you are using and verify that your computer is protected by the following three core protections: anti-virus, anti-spyware, and a firewall. Step 9 These core protections should be augmented by anti-spam and safe search software like McAfee SiteAdvisor that features anti-phishing protection and safety ratings. It is also a very good idea for families to have a suite of protections on home PCs that includes parental controls, like McAfee Family Protection software and identity theft prevention tools. 15

16 Step 10 Stay Informed The more you know, the safer you will be. Check out McAfee s Security Advice Center for easy-to-read educational material on computer and Internet security: Step 10 16

17 The ABCs of Online Security For Kids 3 7 Years Old

18 A Talking to young kids When you talk to young children about Internet safety, do it with the computer turned off, so that you have their undivided attention. Start off by explaining that a computer is a tool and that the Internet is like a giant electronic library full of information. Explain why it s important to be safe online because the computer can be an open door to your important personal information. Talk to them about how bad people can take control of your PC and break it, so that you have to buy a new one. Explain to them why it s important not to share personal information with people online. Tell them not to use their real names and not to talk about where they live or what school they go to. 18

19 B Create a special list of rules for computer use by young kids The list should include: Do not download music or program files from websites without parental permission Use only monitored chat rooms where an adult actually monitors the chat Never send out a picture of yourself without talking to your parents first Do not use bad language Do not visit adult websites Share information only with people you know from the real world, such as classmates, friends, and family members Do not fill out online forms or surveys without a parent s help Use only special search engines for children like Ask for Kids and Yahoo! Kids 19

20 C Use browsers and search engines especially designed for children Make sure that your children are using browsers and search engines that do not display inappropriate words or images. Check that they come preloaded with safe websites and preset word filters. All you need to do is review and approve the default websites and words. If your children use a standard search engine, make sure you turn on the parental controls in the search engine to block inappropriate images and content from appearing in search results. 20

21 The ABCs of Online Security For Tweens 8 12 Years Old

22 A Talking to your tween-ager Youngsters between the ages of eight and twelve are far more sophisticated than children in that age range used to be. The term tween was coined to accurately reflect this population of kids who are no longer considered young but are not yet teenagers. Understand that tweens are quite comfortable using a computer, having grown up with one at home and/or at school. Before you speak to tweens, you need to make some decisions so that you can create boundaries surrounding their Internet use. In order to clearly communicate what the rules are, you need to first define them. To help keep your tween safe, you need to know the answers to the following questions: Is the computer in a public area of the home? What websites are safe for your tween to visit? How long should their online sessions be? What can they do while they are online? Who are they allowed to interact with? If you are not going to monitor your tweens, when should they seek your help and approval? 22

23 Once you know the answers to those questions, you can proceed with the talk. With the computer turned off, so that you have their undivided attention, you should explain to your tween-ager that a computer is a tool and that it s important to be safe online. Be sure to cover the following points: Discuss viruses, spyware, and hackers Discuss how child predators like to lure kids into talking about themselves Explain why it s important to be safe online because the computer can be an open door to your important personal information Discuss how identity theft occurs Discuss the fact that you or a computer expert (if you re not one) can track every single thing that is done on your computer Talk about how criminals can take control of your PC and break it, so that you have to buy a new one 23

24 B Remind your child to ask for assistance if something upsetting occurs online Stress to your tweens that they need to tell you if they receive any odd or upsetting messages while chatting online and that you will not be angry with them or ban them from using the Internet as a result. Make it clear to your child that you understand that they cannot control what other people say to them and that they are not to blame if this happens. Also, be sure that your tween is not being bullied or bullying other children online. When school children leave campus, they don t necessarily leave their classmates and their conflicts behind. Using computers, text pagers, and cell phones, students can be in touch with each other at all times and they may abuse this technology to pester, bully, and harm others. 24

25 C How to block users and how to report problems If your child has an online incident while chatting, you can report the problem and block the user. First, copy the chat messages and paste the text into a word processing program. Next, send the copied log to the chat room moderator or administrator. You can find contact information for the moderator or administrator in the help or reporting section of the program. Most chat programs also allow you to block a user by right clicking on the name in the contact list and choosing the Block or Ignore feature. 25

26 The ABCs of Online Security For Teens Years Old

27 A Talking to your teens Just like you have to teach teenagers road safety before they drive a car, you also have to teach them about Internet safety before you let them surf the web unmonitored. A major difference between hopping in a car and hopping on the Internet is that there are no real rules of the road on the Internet. This makes it both a very powerful and a very dangerous vehicle. So, to avoid computer crashes or worse, you need to make the rules and enforce them. The goal here is to teach teens common sense to steer clear of online dangers. 27

28 Talk to your teenager about why it s important to be safe online. Be sure to cover the following points: Discuss viruses, spyware, and hackers and how they operate Discuss how predators like to lure vulnerable young people into talking about themselves Explain why it s important to be safe online because the computer can be an open door to all of your important personal information Discuss how identity theft occurs Discuss the fact that you or a computer expert (if you re not one) can track every single thing that is done on your computer Talk about how criminals can take control of your PC and break it, so that you have to buy a new one 28

29 B Remind your teen that the people they meet online are strangers No matter how often they chat with them and no matter how well they think they know them, people your teens meet online are strangers. People can lie about who they are, and your teenager s new friend may really be a 40-year-old man instead of someone their own age. C Check your teen s profile on social networking sites Make sure your teens are not posting too much information about themselves on Bebo, Orkut or Facebook. Be sure that the photographs they post are not provocative. Remind them that they might draw interest from online predators, embarrass friends and family, disappoint a potential college admissions representative, or negatively influence a future employer. 29

30 The ABCs of Online Security For Novices of Any Age

31 Your spouse, your partner, your parents, your in-laws, or your grandparents may be new to using a computer and the Internet. They may not be as savvy as you think and could fall victim to online scams and cyber attacks. Therefore, they will need a little guidance from you. Your web safety discussion should include the following: A Viruses, spyware, and hackers If you want definitions of these terms you can find them easily through online searches or the glossary at 31

32 B Identity theft dangers and phishing Phishing occurs when criminals spoof a website and of a legitimate company, trying to steal passwords and credit card numbers. Be sure to check your credit card and banking statements frequently. C The importance of using caution when downloading free items Remind your loved ones of the old axiom that everything comes with a price, even if it s free! Also, warn them that if they download software, they may get adware and spyware along with the application. 32

33 More Advice on PC and Internet Security For more information and advice about PC and Internet security, please visit the McAfee Security Advice Center at About McAfee McAfee, Inc., headquartered in Santa Clara, California, is the world s largest dedicated security technology company. McAfee is committed to relentlessly tackling the world s toughest security challenges. The company delivers proactive and proven solutions and services that help secure systems and networks around the world, allowing users to safely connect to the Internet, browse and shop the web more securely. Backed by an award-winning research team, McAfee creates innovative products that empower home users, businesses, the public sector and service providers by enabling them to prove compliance with regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and improve their security. McAfee, Inc Freedom Circle Santa Clara, CA McAfee and/or other noted McAfee related products contained herein are registered trademarks or trademarks of McAfee, Inc., and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. Any other non-mcafee related products, registered and/or unregistered trademarks contained herein is only by reference and are the sole property of their respective owners McAfee, Inc. All rights reserved. 6385gde_10-step-internet-safety_intl_0509

DIGITAL DECEPTION: THE ONLINE BEHAVIOUR OF TEENS

DIGITAL DECEPTION: THE ONLINE BEHAVIOUR OF TEENS DIGITAL DECEPTION: THE ONLINE BEHAVIOUR OF TEENS Foreword We love technology, and with good reason. It offers so much to the home in terms of entertainment, education, as well improving the functionality

More information

guide to staying safe online How to shop, bank, socialise and protect your identity online.

guide to staying safe online How to shop, bank, socialise and protect your identity online. THE Mcafee guide to staying safe online How to shop, bank, socialise and protect your identity online. contents 1 Introduction 2 Today s Internet: Proceed with Caution 3 Consider the Upsides 4 Be Aware

More information

McAfee Family Protection

McAfee Family Protection User Guide The Easiest, Most Complete Way to Keep Your Children Safe Online Quick Start Easy CD Installation STEP 1: First, ensure that your computer meets or exceeds the minimum systems requirements listed

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

McAfee S DO s AnD DOn ts Of Online Shopping

McAfee S DO s AnD DOn ts Of Online Shopping McAfee s Do s and don ts OF Online Shopping Table of Contents Foreword by Parry Aftab, 3 Online Safety Expert Online Shopping: The Real Deal 4 The DO s and DON Ts 5 Summary 17 Resources 18 Happy Online

More information

Saheel KHOYRATTY. Partner Technology Advisor

Saheel KHOYRATTY. Partner Technology Advisor Saheel KHOYRATTY Partner Technology Advisor The Internet = A World of Opportunities Look what s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment

More information

Guideline on Windows 7 Parental Controls

Guideline on Windows 7 Parental Controls CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius

More information

Shop Online with Confidence

Shop Online with Confidence Shop Online with Confidence Table of Contents Introduction 3 Benefits and Drawbacks of Online Shopping Benefits Drawbacks 5 6 Tips for Safe Online Shopping Before You Buy When Making a Purchase After Your

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

McAfee Total Protection Reduce the Complexity of Managing Security

McAfee Total Protection Reduce the Complexity of Managing Security McAfee Total Protection Reduce the Complexity of Managing Security Computer security has changed dramatically since the first computer virus emerged 25 years ago. It s now far more complex and time-consuming.

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

A Parent s Guide to Social Networking Sites

A Parent s Guide to Social Networking Sites A Parent s Guide to Social Networking Sites Five Lessons to Keep Your Kids Safe When They Socialize Online fa ye boo web mod. book.c club pe myspace facebook club peng.com yomo space webk yomod.com facebook

More information

Social Networking Sites A Predator s Playground?

Social Networking Sites A Predator s Playground? Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

Top 10 Tips to Keep Your Small Business Safe

Top 10 Tips to Keep Your Small Business Safe Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Cyber Safety For Parents

Cyber Safety For Parents Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360. Norton 360 Our ultimate protection, now even more so. Introducing the new Norton 360. Our ultimate Internet and antivirus protection for all you do online Provides proactive protection, so you can do what

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

How To Teach Kids To Be Safe Online

How To Teach Kids To Be Safe Online McAfee, an Intel company, is the world's largest dedicated security technology company. We are relentlessly focused on finding new ways to keep our customers and our communities safe, and especially our

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone? SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers

More information

Internet Safety Guide for Parents

Internet Safety Guide for Parents Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both

More information

Statistical Analysis of Internet Security Threats. Daniel G. James

Statistical Analysis of Internet Security Threats. Daniel G. James Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

Case study: What the? Online scams and identity theft

Case study: What the? Online scams and identity theft Case study: What the? Online scams and identity theft Theme The internet and mobile technologies are a source of scams and identity theft. Key learning/subject areas Cross curricula. Duration One to two

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

HOW TO STAY SAFE. Smartphones

HOW TO STAY SAFE. Smartphones HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these

More information

Seven Practices for Computer Security

Seven Practices for Computer Security A WorkLife4You Guide Seven Practices for Computer Security Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than

More information

National Cybersecurity Awareness Campaign Families Presentation

National Cybersecurity Awareness Campaign Families Presentation National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security

More information

WISE Online: An Internet and Mobile Phone Guide. http://esafety.ngfl-cymru.org.uk

WISE Online: An Internet and Mobile Phone Guide. http://esafety.ngfl-cymru.org.uk WISE Online: An Internet and Mobile Phone Guide http://esafety.ngfl-cymru.org.uk File sharing and Copyright Everyone loves to file share to get music files. But here are some points to take note of: Downloading

More information

Understand What s Going On

Understand What s Going On Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud

More information

Data protection. Protecting your personal information online

Data protection. Protecting your personal information online Data protection Protecting your personal information online 3 Introduction More and more people are conducting their personal affairs online. Online shopping, social networking, job hunting and the ability

More information

CYBER. www.bytecrime.org MIND. WHAT YOU do ONLINE. Kids FOR

CYBER. www.bytecrime.org MIND. WHAT YOU do ONLINE. Kids FOR CYBE www.bytecrime.org MND WHT YU do NLNE F Kids M Crime reventing Goes nline Hi, kids. McGruff the Crime Dog here. know from preventing crime on the streets and in neighborhoods that you need to be smarter

More information

E-safety: Protecting your child online. Information for parents

E-safety: Protecting your child online. Information for parents E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools

More information

McAfee Internet Security Suite Quick-Start Guide

McAfee Internet Security Suite Quick-Start Guide Enjoy a Worry Free Online Experience McAfee Internet Security Suite protects your PC, identity and online experience. It also includes PC and network tools, plus McAfee SiteAdvisor for safe surfing. Internet

More information

Internet Safety Guidelines

Internet Safety Guidelines Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can

More information

Chatroom and messaging safety Staying away from pornography Avoiding internet bullying. Keeping your child safe on the. internet

Chatroom and messaging safety Staying away from pornography Avoiding internet bullying. Keeping your child safe on the. internet Chatroom and messaging safety Staying away from pornography Avoiding internet bullying Keeping your child safe on the internet AT A GLANCE Using the internet and messaging safely Not everyone who uses

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

How To Stop Cyberbullying

How To Stop Cyberbullying XCS - Objectionable Content Filtering Stop Cyber-Bullying in its Tracks - Protect Schools and the Workplace Technical Brief WatchGuard Technologies Published: January 2011 Cyber-Bullying Bullies are everywhere

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Cyber Security. Securing Your Mobile and Online Banking Transactions

Cyber Security. Securing Your Mobile and Online Banking Transactions Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet

More information

Laura Royer, Extension Faculty, University of Florida/IFAS Osceola County Extension Services

Laura Royer, Extension Faculty, University of Florida/IFAS Osceola County Extension Services Consumer Choices: Computer Security Software Prepared by: Dave Palmer, Instructional Media Faculty, University of Florida/IFAS Extension, South Central Extension District Laura Royer, Extension Faculty,

More information

What You Need to Know to Avoid Identity Theft

What You Need to Know to Avoid Identity Theft What You Need to Know to Avoid Identity Theft Table of Contents Introduction 3 What is Identity Theft? 4 Important Identity Theft Facts 6 Types of Identity Theft 7 Financial Identity Theft 8 Criminal/Impersonation

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual

More information

From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense

From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense 1 of 5 11/17/2014 4:14 PM 800.268.2440 From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense Share This Every other week it seems like there is another secure data breach

More information

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

2014 Teen Internet Safety Survey. Conducted by The Futures Company

2014 Teen Internet Safety Survey. Conducted by The Futures Company 2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

Cyber Security: Beginners Guide to Firewalls

Cyber Security: Beginners Guide to Firewalls Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started

More information

Online Safety How to Protect Yourself and Your Family

Online Safety How to Protect Yourself and Your Family Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing

More information

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National

More information

Identity Theft and Online Security

Identity Theft and Online Security Identity Theft and Online Security ACI-588788 American Century Investment Services, Inc. Goals for Presentation Identity Theft - What is it and how are we at risk? Social Media - How much online security

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

Cyber Safety Handbook 2014

Cyber Safety Handbook 2014 Cyber Safety Handbook 2014 Mission & Vision Statements Mission To provide students with an excellent, all-round education in a Christian environment. Cricos No: 01645K Vision Woodcroft College aspires

More information

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus Telecommunication Tools TECHNOLOGY The Internet is like a giant web of computers connected. The Internet is also called the World Wide Web. There are good places to go on the Internet and there are some

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of

More information

Vocabulary: These words will help you understand this lesson.

Vocabulary: These words will help you understand this lesson. Internet Activities Vocabulary: These words will help you understand this lesson. Word/Term computer Internet chat room Definition Materials Needed: pen or pencil access to computer / Internet electronic

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION

STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the

More information

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

Staying Safe.....on social media and online

Staying Safe.....on social media and online Staying Safe.....on social media and online What is this guide about This booklet is about how to keep safe when you are using social media and the internet. Some people get called names, are bullied or

More information

NET CETERA Chatting with Kids About Being Online

NET CETERA Chatting with Kids About Being Online NET CETERA Chatting with Kids About Being Online People of all ages are: connecting with friends and family online Communicating online is a way of life, yet it comes with certain risks: Inappropriate

More information

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying

More information

SENIORS ONLINE SECURITY

SENIORS ONLINE SECURITY SENIORS ONLINE SECURITY Seniors Online Security Five Distinct Areas Computer security Identity crime Social networking Fraudulent emails Internet banking 1 Computer security 2 There are several ways that

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

GET. Northwestern University Information Technology www.it.northwestern.edu

GET. Northwestern University Information Technology www.it.northwestern.edu GET 4 Easy Steps to Computer Securit y Northwestern University Information Technology www.it.northwestern.edu My computer has antivirus software. That means I m protected, right? I don t need to worry

More information

OKPAY guides. Security Guide

OKPAY guides. Security Guide Название раздела OKPAY guides www.okpay.com Security Guide 2012 Contents SECURITY GUIDE Contents Introduction 1. OKPAY Security Overview 2. Security Tips 3. Security Center 3.1. Basic Protection 3.2. Email

More information

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) Social Network Security Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) How Do We Communicate Today? I can write you a letter by snail mail. I can write you a letter

More information

Practical guide for secure Christmas shopping. Navid

Practical guide for secure Christmas shopping. Navid Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security

More information

7 PRACTICES FOR SAFER COMPUTING

7 PRACTICES FOR SAFER COMPUTING 7 7 PRACTICES FOR SAFER COMPUTING EFFICIENT SHOPPING ACCESS TO INFORMATION, MUSIC, AND GAMES EDUCATIONAL RESOURCES TRAVEL PLANNING SPORTS, HOBBIES, AND SOCIAL NETWORKS CONNECTIONS TO FAMILY AND FRIENDS

More information

Safety Tips for Social Networking

Safety Tips for Social Networking Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Digital Safety and Privacy

Digital Safety and Privacy Digital Safety and Privacy Class Description: As computers and the Internet become more and more the way we communicate, we need to be aware of potential threats to our security online. This class discusses

More information

Learn about each tool in parental controls and find out how you can use them to secure you and your family.

Learn about each tool in parental controls and find out how you can use them to secure you and your family. TrendLabs Parental controls are not just for your kids. Online threats, after all, affect everyone. Effective use of parental controls, combined with proper know-how on dealing with online threats, can

More information

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information